You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package (implicit)
name:my-package (explicit)
Search by package filename:
filename:my-package.ext
Search by package tag:
tag:latest
Search by package version:
version:1.0.0
prerelease:true (prereleases)
prerelease:false (no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search by last download date:
last_downloaded:<"30 days ago"
last_downloaded:>"August 14, 2022 EST"
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Search queries for all Generic-specific package types
Search by file path:
generic_filepath:path/to/file.txt
Search by directory:
generic_directory:path/to
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo for negation
For string queries, you can use:
^foo to anchor to start of term
foo$ to anchor to end of term
foo*bar for fuzzy matching
For number/date or version queries, you can use:
>foo for values greater than
>=foo for values greater / equal
<foo for values less than
<=foo for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Generic,
Go,
Helm,
Hex,
HuggingFace,
LuaRocks,
Maven,
MCP,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
VSX,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.
kurrentdb
26.0.2-experimental-arm64-1…
One-liner (summary)
Description
| Status | Completed |
|---|---|
| Checksum (MD5) | 923fe5783bfdbb0336f33cd84c5096eb |
| Checksum (SHA-1) | 41ed5e2721c5fe053f2ed54d8f05ce7b456d9318 |
| Checksum (SHA-256) | c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae |
| Checksum (SHA-512) | 613b44e3c0dd158397ae755c02fba4645a402efe2a33d00020d48475f517cb483a… |
| GPG Signature | |
| GPG Fingerprint | add5007d2a49659fcc308d62501c1f0df3660d29 |
| Storage Region | Dublin, Ireland |
| Type | Binary (contains binaries and binary artifacts) |
| Uploaded At | 2 months, 1 week ago |
| Uploaded By |
|
| Slug Id | kurrentdb-fsgx |
| Unique Id | druofLqQ6joD |
| Version (Raw) | 26.0.2-experimental-arm64-10.0-noble |
| Version (Parsed) |
|
| Orig Version (Raw) | c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae |
| Orig Version (Parsed) |
|
| docker-specific metadata | |
| Image Digest | sha256:c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae |
| Config Digest | sha256:12e285af248c1a6ac14ac5ce87e639c0052548ff6e3d34ce143b397772dea4f8 |
| V1 OCI Index Digest | sha256:5810f978bf6c36bb6c3472a43a29546c80c012e139c8c912df82447374f52cbd |
| V1 Distribution (Signed) Digest | sha256:268d052b3f5aef4571b5800f7493803d07ef36787e93015efd01adc090beee32 |
| V1 OCI Digest | sha256:363ce7f978c0d4fbac4ceeb3f7df7ba39c996064784e74e4bf319a086bd46230 |
| V2 Distribution List Digest | sha256:ce862cdd526417521b741a82fa3d02a700d0c7dd7313fa067fbb7513c1eb71ea |
| V1 Distribution Digest | sha256:359faf19148e63841013270c1fec6cbc00467f319b06c0e582e5d85b41b6ec5d |
| V2 Distribution Digest | sha256:c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae |
| extended metadata | |
| Manifest Type | V2 Distribution |
| Architecture | arm64 |
| Config | |
| Created | 2026-03-12 17:38:32 UTC |
| Os | linux |
This package was uploaded with the following V2 Distribution manifest:
{
"schemaVersion": 2,
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
"config": {
"mediaType": "application/vnd.docker.container.image.v1+json",
"size": 7246,
"digest": "sha256:c5df40e6c209802a0d4684e2b076bcff2985af6ca83ce99fd43f3e884f640e91"
},
"layers": [
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 29945809,
"digest": "sha256:4063c7057777bcbe0700af76fbf015ba08cd5124d158647337aa97989e9ddcc3"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 16793234,
"digest": "sha256:e0359acbfab1dc7f210cca43a6771af90faa52296341e29c311fa2d62a1697ba"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 3565,
"digest": "sha256:b71952e7ace5e8490cbb88a96f5dc32d638ce02be82c3d4878df9c2418a4a1bd"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 44007157,
"digest": "sha256:2e975a4142c317ba6c4f270c11be38d47616ff13b37e940d9e4a8f8a1bc31ef7"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 2811069,
"digest": "sha256:3bea311b3c7a6e62fd14a999ad4bc5f5f3e3dd9084918956b5584fdabbce54c8"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 1335,
"digest": "sha256:78f6accbc4f0f143799e23ff8985a4104690156f8ea415fec41f402e86bca7ba"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 145990323,
"digest": "sha256:d232bbfbb725bb7404dfc7fd826852240b29ff06451a57cad845e8c6ea55d6a9"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 32,
"digest": "sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 191,
"digest": "sha256:66d3e252662106dcfc824250bacdb1e51ba53340d15668cdb7c1b839d4f7b8e7"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 189,
"digest": "sha256:6064962f983362835da755e4f5227378a15bd24fbcb4cc7d1b839357d096526f"
}
]
}
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) ARG RELEASE |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) ARG LAUNCHPAD_BUILD_ARCH |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) LABEL org.opencontainers.image.ref.name=ubuntu |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) LABEL org.opencontainers.image.version=24.04 |
32 bytes | ||
|
Digest:
sha256:4063c7057777bcbe0700af76fbf015ba08cd5124d158647337aa97989e9ddcc3
Command: /bin/sh -c #(nop) ADD file:2763d61bc43bd178306ae0d4151c2477166ebf199b8d7294d9ea410f9891993f in / |
28.6 MB | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) CMD ["/bin/bash"] |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV APP_UID=1654 ASPNETCORE_HTTP_PORTS=8080 DOTNET_RUNNING_IN_CONTAINER=true |
32 bytes | ||
|
Digest:
sha256:e0359acbfab1dc7f210cca43a6771af90faa52296341e29c311fa2d62a1697ba
Command: RUN /bin/sh -c apt-get update && apt-get install -y --no-install-recommends ca-certificates libc6 libgcc-s1 libicu74 libssl3t64 libstdc++6 tzdata tzdata-legacy && rm -rf /var/lib/apt/lists/* # buildkit |
16.0 MB | ||
|
Digest:
sha256:b71952e7ace5e8490cbb88a96f5dc32d638ce02be82c3d4878df9c2418a4a1bd
Command: RUN /bin/sh -c groupadd --gid=$APP_UID app && useradd --no-log-init --uid=$APP_UID --gid=$APP_UID --create-home app # buildkit |
3.5 KB | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG DATABASE_ARCHIVE_DIR=kurrentdb-26.0.2-experimental-linux-arm64.tar.gz |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG UID=1001 |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG GID=1001 |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV LANGUAGE=en_US:en DEBIAN_FRONTEND=noninteractive ACCEPT_EULA=Y |
32 bytes | ||
|
Digest:
sha256:2e975a4142c317ba6c4f270c11be38d47616ff13b37e940d9e4a8f8a1bc31ef7
Command: RUN |3 DATABASE_ARCHIVE_DIR=kurrentdb-26.0.2-experimental-linux-arm64.tar.gz UID=1001 GID=1001 /bin/sh -c apt-get update && apt-get upgrade -y && apt-get clean # buildkit |
42.0 MB | ||
|
Digest:
sha256:3bea311b3c7a6e62fd14a999ad4bc5f5f3e3dd9084918956b5584fdabbce54c8
Command: RUN |3 DATABASE_ARCHIVE_DIR=kurrentdb-26.0.2-experimental-linux-arm64.tar.gz UID=1001 GID=1001 /bin/sh -c apt update && apt install -y adduser curl && rm -rf /var/lib/apt/lists/* # buildkit |
2.7 MB | ||
|
Digest:
sha256:78f6accbc4f0f143799e23ff8985a4104690156f8ea415fec41f402e86bca7ba
Command: RUN |3 DATABASE_ARCHIVE_DIR=kurrentdb-26.0.2-experimental-linux-arm64.tar.gz UID=1001 GID=1001 /bin/sh -c addgroup --gid ${GID} "kurrent" && adduser --disabled-password --gecos "" --ingroup "kurrent" --no-create-home --uid ${UID} "kurrent" # buildkit |
1.3 KB | ||
|
Digest:
sha256:d232bbfbb725bb7404dfc7fd826852240b29ff06451a57cad845e8c6ea55d6a9
Command: COPY --chown=kurrent:kurrent kurrentdb-26.0.2-experimental-linux-arm64.tar.gz /opt/kurrentdb/ # buildkit |
139.2 MB | ||
|
Digest:
sha256:4f4fb700ef54461cfa02571ae0db9a0dc1e0cdb5577484a6d75e68dc38e8acc1
Command: WORKDIR /opt/kurrentdb |
32 bytes | ||
|
Digest:
sha256:66d3e252662106dcfc824250bacdb1e51ba53340d15668cdb7c1b839d4f7b8e7
Command: RUN |3 DATABASE_ARCHIVE_DIR=kurrentdb-26.0.2-experimental-linux-arm64.tar.gz UID=1001 GID=1001 /bin/sh -c mkdir -p /var/lib/kurrentdb && mkdir -p /var/log/kurrentdb && mkdir -p /etc/kurrentdb && chown -R kurrent:kurrent /var/lib/kurrentdb /var/log/kurrentdb /etc/kurrentdb # buildkit |
191 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: USER kurrent |
32 bytes | ||
|
Digest:
sha256:6064962f983362835da755e4f5227378a15bd24fbcb4cc7d1b839357d096526f
Command: RUN |3 DATABASE_ARCHIVE_DIR=kurrentdb-26.0.2-experimental-linux-arm64.tar.gz UID=1001 GID=1001 /bin/sh -c echo "NodeIp: 0.0.0.0\nReplicationIp: 0.0.0.0" >> /etc/kurrentdb/kurrentdb.conf # buildkit |
189 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: VOLUME [/var/lib/kurrentdb] |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: VOLUME [/var/log/kurrentdb] |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: EXPOSE map[1112/tcp:{}] |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: EXPOSE map[1113/tcp:{}] |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: EXPOSE map[2113/tcp:{}] |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: HEALTHCHECK &{["CMD-SHELL" "curl --fail --insecure https://localhost:2113/health/live || curl --fail http://localhost:2113/health/live || exit 1"] "5s" "5s" "0s" "0s" '\x18'} |
32 bytes | ||
|
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENTRYPOINT ["/opt/kurrentdb/kurrentd"] |
32 bytes |
| Newer |
|
kurrentdb |
26 |
|
||
| Newer |
|
kurrentdb |
2 |
|
||
| Newer |
|
kurrentdb |
30 |
|
||
| Newer |
|
kurrentdb |
2 |
|
||
| Newer |
|
kurrentdb |
2 |
|
||
| Newer |
|
kurrentdb |
1 |
|
||
|
|
kurrentdb |
30 |
|
|||
| Older |
|
kurrentdb |
5 |
|
||
| Older |
|
kurrentdb |
5 |
|
||
| Older |
|
kurrentdb |
5 |
|
||
| Older |
|
kurrentdb |
30 |
|
||
| Older |
|
kurrentdb |
8 |
|
||
| Older |
|
kurrentdb |
1098 |
|
||
| Older |
|
kurrentdb |
12 |
|
||
| Older |
|
kurrentdb |
30 |
|
||
| Older |
|
kurrentdb |
5 |
|
||
| Older |
|
kurrentdb |
6 |
|
||
| Older |
|
kurrentdb |
5 |
|
||
| Older |
|
kurrentdb |
15 |
|
||
| Older |
|
kurrentdb |
35 |
|
Last scanned
2 months, 1 week ago
Scan result
Vulnerable
Vulnerability count
9
Max. severity
Medium| Target: | druofLqQ6joD.sbom-cyclonedx.json (ubuntu 24.04) | |
| MEDIUM |
CVE-2025-68972: gnupg: GnuPG: Signature bypass via form feed character in signed messagesIn GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.Package Name: gpgv Installed Version: 2.4.4-2ubuntu17.4 Fixed Version: References: access.redhat.com gpg.fail media.ccc.de news.ycombinator.com nvd.nist.gov www.cve.org |
|
| MEDIUM |
CVE-2025-8941: linux-pam: Incomplete fix for CVE-2025-6020A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.Package Name: libpam-modules Installed Version: 1.5.3-5ubuntu5.5 Fixed Version: References: access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org cve.mitre.org errata.almalinux.org errata.rockylinux.org linux.oracle.com linux.oracle.com nvd.nist.gov www.cve.org |
|
| MEDIUM |
CVE-2025-8941: linux-pam: Incomplete fix for CVE-2025-6020A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.Package Name: libpam-modules-bin Installed Version: 1.5.3-5ubuntu5.5 Fixed Version: References: access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org cve.mitre.org errata.almalinux.org errata.rockylinux.org linux.oracle.com linux.oracle.com nvd.nist.gov www.cve.org |
|
| MEDIUM |
CVE-2025-8941: linux-pam: Incomplete fix for CVE-2025-6020A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.Package Name: libpam-runtime Installed Version: 1.5.3-5ubuntu5.5 Fixed Version: References: access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org cve.mitre.org errata.almalinux.org errata.rockylinux.org linux.oracle.com linux.oracle.com nvd.nist.gov www.cve.org |
|
| MEDIUM |
CVE-2025-8941: linux-pam: Incomplete fix for CVE-2025-6020A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.Package Name: libpam0g Installed Version: 1.5.3-5ubuntu5.5 Fixed Version: References: access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org cve.mitre.org errata.almalinux.org errata.rockylinux.org linux.oracle.com linux.oracle.com nvd.nist.gov www.cve.org |
|
| MEDIUM |
CVE-2026-3731: libssh: libssh: Denial of Service via out-of-bounds read in SFTP extension name handlerA weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.Package Name: libssh-4 Installed Version: 0.10.6-2ubuntu0.3 Fixed Version: References: access.redhat.com gitlab.com nvd.nist.gov vuldb.com vuldb.com vuldb.com www.cve.org www.libssh.org www.libssh.org |
|
| MEDIUM |
CVE-2025-45582: tar: Tar path traversalGNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.Package Name: tar Installed Version: 1.35+dfsg-3build1 Fixed Version: References: www.openwall.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org errata.almalinux.org errata.rockylinux.org github.com linux.oracle.com linux.oracle.com lists.gnu.org nvd.nist.gov www.cve.org www.gnu.org www.gnu.org www.gnu.org www.gnu.org |
|
| LOW |
CVE-2016-2781: coreutils: Non-privileged session can escape to the parent session in chrootchroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.Package Name: coreutils Installed Version: 9.4-3ubuntu6.1 Fixed Version: References: seclists.org www.openwall.com www.openwall.com access.redhat.com lists.apache.org lore.kernel.org mirrors.edge.kernel.org nvd.nist.gov www.cve.org |
|
| LOW |
CVE-2022-3219: gnupg: denial of service issue (resource consumption) using compressed packetsGnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.Package Name: gpgv Installed Version: 2.4.4-2ubuntu17.4 Fixed Version: References: access.redhat.com bugzilla.redhat.com dev.gnupg.org dev.gnupg.org marc.info nvd.nist.gov security.netapp.com www.cve.org |
|
| LOW |
CVE-2024-2236: libgcrypt: vulnerable to Marvin AttackA timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.Package Name: libgcrypt20 Installed Version: 1.10.3-2build1 Fixed Version: References: access.redhat.com access.redhat.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org dev.gnupg.org errata.almalinux.org errata.rockylinux.org github.com gitlab.com linux.oracle.com linux.oracle.com lists.gnupg.org nvd.nist.gov www.cve.org |
|
| LOW |
CVE-2025-5222: icu: Stack buffer overflow in the SRBRoot::addTag functionA stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.Package Name: libicu74 Installed Version: 74.2-1ubuntu3.1 Fixed Version: References: access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org errata.almalinux.org errata.rockylinux.org linux.oracle.com linux.oracle.com lists.debian.org nvd.nist.gov www.cve.org |
|
| LOW |
CVE-2024-56433: shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromiseshadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.Package Name: login Installed Version: 1:4.13+dfsg1-4ubuntu3.2 Fixed Version: References: access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org errata.almalinux.org errata.rockylinux.org github.com github.com github.com linux.oracle.com linux.oracle.com nvd.nist.gov www.cve.org |
|
| LOW |
CVE-2024-56433: shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromiseshadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.Package Name: passwd Installed Version: 1:4.13+dfsg1-4ubuntu3.2 Fixed Version: References: access.redhat.com access.redhat.com bugzilla.redhat.com bugzilla.redhat.com cve.mitre.org errata.almalinux.org errata.rockylinux.org github.com github.com github.com linux.oracle.com linux.oracle.com nvd.nist.gov www.cve.org |
|
Package statistics are no longer available on cloudsmith.io. Please visit our new web app to access this feature.
You can embed a badge in another website that shows this or the latest version of this package.
To embed the badge for this specific package version, use the following:
[](https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae/a=arm64;xpo=linux/)
|This version of 'kurrentdb' @ Cloudsmith|
.. |This version of 'kurrentdb' @ Cloudsmith| image:: https://api.cloudsmith.com/v1/badges/version/eventstore/kurrent-preview/docker/kurrentdb/26.0.2-experimental-arm64-10.0-noble/a=arm64;xpo=linux/?render=true
:target: https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae/a=arm64;xpo=linux/
image::https://api.cloudsmith.com/v1/badges/version/eventstore/kurrent-preview/docker/kurrentdb/26.0.2-experimental-arm64-10.0-noble/a=arm64;xpo=linux/?render=true[link="https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae/a=arm64;xpo=linux/",title="This version of 'kurrentdb' @ Cloudsmith"]
<a href="https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/c1683160872027d06fdd2cac637cfa7aaae3e319b4852f1837aa4234100340ae/a=arm64;xpo=linux/"><img src="https://api.cloudsmith.com/v1/badges/version/eventstore/kurrent-preview/docker/kurrentdb/26.0.2-experimental-arm64-10.0-noble/a=arm64;xpo=linux/?render=true" alt="This version of 'kurrentdb' @ Cloudsmith" /></a>
rendered as:
To embed the badge for the latest package version, use the following:
[](https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/latest/a=arm64;xpo=linux/)
|Latest version of 'kurrentdb' @ Cloudsmith|
.. |Latest version of 'kurrentdb' @ Cloudsmith| image:: https://api.cloudsmith.com/v1/badges/version/eventstore/kurrent-preview/docker/kurrentdb/latest/a=arm64;xpo=linux/?render=true&show_latest=true
:target: https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/latest/a=arm64;xpo=linux/
image::https://api.cloudsmith.com/v1/badges/version/eventstore/kurrent-preview/docker/kurrentdb/latest/a=arm64;xpo=linux/?render=true&show_latest=true[link="https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/latest/a=arm64;xpo=linux/",title="Latest version of 'kurrentdb' @ Cloudsmith"]
<a href="https://cloudsmith.io/~eventstore/repos/kurrent-preview/packages/detail/docker/kurrentdb/latest/a=arm64;xpo=linux/"><img src="https://api.cloudsmith.com/v1/badges/version/eventstore/kurrent-preview/docker/kurrentdb/latest/a=arm64;xpo=linux/?render=true&show_latest=true" alt="Latest version of 'kurrentdb' @ Cloudsmith" /></a>
rendered as:
These instructions assume you have setup the repository first (or read it).
To pull kurrentdb @ reference/tag 806beef0-87ad-40fb-865a-b736dadd8c04:
docker pull docker.eventstore.com/kurrent-preview/kurrentdb:806beef0-87ad-40fb-865a-b736dadd8c04
You can also pull the latest version of this image (if it exists):
docker pull docker.eventstore.com/kurrent-preview/kurrentdb:latest
To refer to this image after pulling in a Dockerfile, specify the following:
FROM docker.eventstore.com/kurrent-preview/kurrentdb:806beef0-87ad-40fb-865a-b736dadd8c04
Note: You should replace 806beef0-87ad-40fb-865a-b736dadd8c04 with an alternative reference to pull, such as: 26.0.2-experimental-arm64-10.0-noble.